{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:10:10Z","timestamp":1751501410003,"version":"3.41.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319777023"},{"type":"electronic","value":"9783319777030"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-77703-0_109","type":"book-chapter","created":{"date-parts":[[2018,3,24]],"date-time":"2018-03-24T11:53:05Z","timestamp":1521892385000},"page":"1124-1130","source":"Crossref","is-referenced-by-count":1,"title":["E-Mail Client Multiplatform for the Transfer of Information Using the SMTP Java Protocol Without Access to a Browser"],"prefix":"10.1007","author":[{"given":"Liliana","family":"Enciso","sequence":"first","affiliation":[]},{"given":"Ruben","family":"Baez","sequence":"additional","affiliation":[]},{"given":"Alvaro","family":"Maldonado","sequence":"additional","affiliation":[]},{"given":"Elmer","family":"Zelaya-Policarpo","sequence":"additional","affiliation":[]},{"given":"Pablo Alejandro","family":"Quezada-Sarmiento","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"109_CR1","doi-asserted-by":"crossref","unstructured":"Khanji, S., Jabir, R., Ahmad, L., Alfandi, O., Said, H.: Evaluation of Linux SMTP server security aspects??? a case study. In: 2016 7th International Conference on Information and Communication Systems (ICICS), pp. 252\u2013257. IEEE (2016)","DOI":"10.1109\/IACS.2016.7476120"},{"key":"109_CR2","doi-asserted-by":"crossref","unstructured":"Lin, S.C., Wen, C.Y., Sethares, W.A.: Two-tier device-based authentication protocol against PUEA attacks for IoT applications. IEEE Trans. Signal Inf. Process. Over Netw. PP(99), 1 (2017)","DOI":"10.1109\/TSIPN.2017.2723761"},{"issue":"01","key":"109_CR3","first-page":"1","volume":"6","author":"AS Babrahem","year":"2014","unstructured":"Babrahem, A.S., Alharbi, E.T., Alshiky, A.M., Alqurashi, S.S., Kar, J., et al.: Study of the security enhancements in various e-mail systems. J. Inf. Secur. 6(01), 1 (2014)","journal-title":"J. Inf. Secur."},{"key":"109_CR4","unstructured":"Zadgaonkar, A., Kashyap, S., Patel, M.C.: Developing a model to detect e-mail address spoofing using biometrics technique. Int. J. Sci. Mod. Eng. (IJISME) (2013). ISSN: 2319\u20136386"},{"key":"109_CR5","unstructured":"Fiebig, T., Lichtblau, F., Streibelt, F., Krueger, T., Lexis, P., Bush, R., Feldmann, A.: Sok: an analysis of protocol design: avoiding traps for implementation and deployment. arXiv preprint arXiv:1610.05531 (2016)"},{"key":"109_CR6","unstructured":"Enciso, L., Pachar, J., Palacios, C., Zelaya, E., Pablo, Q.: Instant messaging application (MI-UTPL). In: 2017 7th International Workshop on Computer Science and Engineering, WCSE 2017, pp. 762\u2013766 (2017). www.scopus.com"},{"key":"109_CR7","doi-asserted-by":"crossref","unstructured":"Hui, X., Qingde, H.: The research on hopping covert channel technique based on multi-protocol. DEStech Trans. Eng. Technol. Res. (2016). ICMITE 2016","DOI":"10.12783\/dtetr\/ICMITE20162016\/4602"},{"key":"109_CR8","doi-asserted-by":"crossref","unstructured":"Kim, E.J., Park, J.D.: A study on a new method of sending an e-mail with an attachment using a wireless terminal. In: 9th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP), pp. 23\u201327. IEEE (2014)","DOI":"10.1109\/CSNDSP.2014.6923791"},{"key":"109_CR9","doi-asserted-by":"crossref","unstructured":"Goel, U., Shah, K., Singh, S., Qadeer, M.A.: EMS: the talking mail service. In: 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN), pp. 622\u2013626. IEEE (2011)","DOI":"10.1109\/ICCSN.2011.6014346"},{"key":"109_CR10","unstructured":"Santamar\u00eda\u00a0Bernales, L.H.: Implementaci\u00f3n de una soluci\u00f3n para evitar la p\u00e9rdida de informaci\u00f3n en el uso de correos electr\u00f3nicos corporativos (2014)"},{"key":"109_CR11","doi-asserted-by":"crossref","unstructured":"Lv, F., Xie, X., Zhang, C., Cheng, X.: Research and development of e-mail program based on Java. In: Proceedings of the 3rd International Conference on Anti-Counterfeiting, Security, and Identification in Communication, pp. 80\u201384. IEEE Press (2009)","DOI":"10.1109\/ICASID.2009.5276955"},{"key":"109_CR12","doi-asserted-by":"crossref","unstructured":"Quispe, L.E., Galan, L.M.: Assessment of throughput performance under NS2 in mobile ad hoc networks (manets). In: 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks, pp. 338\u2013343, June 2013","DOI":"10.1109\/CICSYN.2013.80"},{"key":"109_CR13","unstructured":"Quispe, L., Galan, L.: Analysis of GOS parameter in AODV a DSR in mobile ad hoc networks, pp. 276\u2013279 (2012), https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-84864877085&partnerID=40&md5=1ec5278a97247faad90850155c87cb05"},{"key":"109_CR14","doi-asserted-by":"crossref","unstructured":"Mooloo, D., Fowdur, T.: An SSL-based client-oriented anti-spoofing email application. In: AFRICON 2013, pp. 1\u20135. IEEE (2013)","DOI":"10.1109\/AFRCON.2013.6757757"},{"key":"109_CR15","doi-asserted-by":"crossref","unstructured":"Fowdur, T., Veerasoo, L.: An email application with active spoof monitoring and control. In: 2016 International Conference on Computer Communication and Informatics (ICCCI), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ICCCI.2016.7480002"}],"container-title":["Advances in Intelligent Systems and Computing","Trends and Advances in Information Systems and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-77703-0_109","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T23:40:47Z","timestamp":1751499647000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-77703-0_109"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319777023","9783319777030"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-77703-0_109","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]}}}